Required Skills

Sail Point

Work Authorization

  • Us Citizen

  • Green Card

Preferred Employment

  • Corp-Corp

Employment Type

  • Consulting/Contract

education qualification

  • UG :- - Not Required

  • PG :- - Not Required

Other Information

  • No of position :- ( 1 )

  • Post :- 27th Nov 2020

JOB DETAIL

Sail Point

Visa: GC/USC

Purpose:

TheIdentity and Access Management (IAM) Sr. Security Engineer is a key memberwithin the Identity and Access Management program. The IAM Sr. Security Engineeris a subject matter expert who, through independent project engagements andcollaboration with business and technology partners, as well as third partyvendors, designs and engineers the IAM platforms for the enterprise. Thisposition will serve as subject matter expert (SME) for Sailpoint IdentityIQ andOneLogin, and will be responsible for the configuration and maintenance of theproduct including code management, war file compilation and deployment acrossvarious environments.

Thisrole is responsible for IAM design, engineering, and ensuring that security is“built into” the organization’s application and IAM platforms, including thirdparty vendor connectivity and interactions. The IAM Sr. Security Engineermaintains current knowledge of new products, industry trends and recommendsenhancements and purchases that allow us to maintain healthy and functionalapplications and protect its employee’s identities. This role also providestechnical consulting to management, business users, and technical associates toensure that applications and platforms are secure. This is an individualcontributor position.

Job Responsibilities andAccountabilities:

TechnicalStrategy & Planning:

•                Responsiblefor designing, configuring/developing and managing SailPoint’s IdentityIQsolution within the enterprise.

•                Technical configuration/development lead of Identity IQ

•                Maintain the code and infrastructure of Identity IQ

•                Ensure collection, documentation, and analysis of user stories technical requirements

•                Providetechnical direction to the IdentityIQ developers

•                Createand manage IdentityIQ technical documentation

•                Install,integrate, configure, and deploy IAM solutions and systems to facilitate UserLife-Cycle Management, Identity and Access Governance, Automated Provisioning,Single Sign-On, Federation, Privileged Account Management.

•                Workwith the business units to identify business requirements for requestedprojects.

•                Identifythe technical requirements of projects.

•                Musthave extensive understanding and experience in Java application development aswell as IAM industry standards, concepts, and architecture.

•                Planand organize tasks, coordinate with additional development teams.

•                Reviewand submit technical and security improvement recommendations.

•                ProductAcquisition & Deployment within the Identity Lifecycle Managementtechnology areas

•                Designand develop Identity Lifecycle Management (ILM) solutions based on industrybest practices.

•                Leveragecapabilities of vendor solutions and develop solutions based on future state inmind.

•                Developsolutions based on secure design and/or coding practices.

•                Performanalysis of business models, logical specifications, and/or customerrequirements to design and build Identity Lifecyle Management (ILM) integrationsolutions utilizing multiple technologies.

•                Researchand mitigate significant risks associated with projects.

OperationsManagement:

•                Followthe established change control processes, maintain and modify ILM applications

•                Coordinatechanges with members from IAM and external teams including InfrastructureEngineers, DBAs, application support teams and Information Security.

•                Provideon-call support for production and non-production issues.

•                Trainand teach other engineers and developers.

•                Analyzeperformance of ILM applications and correct deficiencies based on consultationwith teams and approval of manager.

•                Actas Subject Matter Expert in the discovery and investigation of criticalsecurity vulnerabilities, as required.

Job Requirements:

Relevant Experience, Education, Certification, Knowledge, Skills andAbilities

•                Bachelor’sdegree in management information systems, computer science, or relateddiscipline is     required

•                5 years IT experience.

•                3 years of experience in design, implementation, and support of various Identityand/or Access Management (IAM) solutions.

•                3 years of experience in Java programming.

•                Demonstratedexperience with Beanshell, Linux/Unix, Windows, scripting (Bash, PowerShell,Perl), SQL, LDAP, and web services.

•                Experiencewith the design and deployment of secure RESTful Web Services

•                Demonstratedexperience leading and participating in troubleshooting, managing, and solvingissues related to identities, systems, access, accounts, authentication,authorization, entitlements, and permissions.

•                Knowledgeof LDAP and identity federation.

•                Exposurewith source control tools (e.g. Subversion, GIT, CVS)

Preferred Skills:

•                Knowledgeof relational databases (Oracle, MSSQL, MySQL, etc.)

•                Knowledgeof enterprise directories (LDAP, Active Directory, etc.)

•                Knowledgeof enterprise systems (SAP, PeopleSoft, Workday, ServiceNow)

•                Experiencesetting up and installing software on Windows and Unix (Linux, HP, Solaris,AIX) platforms

•                Experiencewith the following web technologies (XML, SPML/SOAP, Web Services, etc.)

•                Experiencewith web application servers (Tomcat, WebSphere, WebLogic, JBOSS, etc.)

•                Familiaritywith Role Based Access Control (RBAC) a plus

•                Hands-onexperience with the Oracle Access Management Stack, (OAM or OIF) or similaraccess management products such as CA Siteminder and/or Okta.

•                Hands-onexperience with Oracle Identity Management Stack (OIM or OIG) or similarIdentity Management products such as OneIdentity and/or RSA. Hands-onexperience working with Oracle Directories (ODSEE, OUD and/or OID), ActiveDirectory or similar LDAP technologies.

•                Experiencewith Agile principles and practices.

•                Knowledgeof ITIL change managements and problem management best practices.

•                Somefamiliarity of iOS and Android ecosystems to support the credentialing ofmobile devices.

Other Functions:

•                Stronganalytical, conceptual, and problem-solving abilities.

•                Goodwritten and oral communication skills.

•                Goodpresentation and interpersonal skills.

•                Provenability and initiative to learn and research new concepts, ideas, andtechnologies quickly.

•                Experienceworking in a team-oriented, collaborative environment.

•                Abilityto translate an idea or need into a completed solution or work product.

•                Abilityto conduct research into IAM issues, standards, and products.

•                Abilityto present ideas in user-friendly language.

•                Ableto prioritize and execute tasks in a high-pressure environment

Physical Environment

•                Sometravel may be required

•                Mostwork is performed in a temperature-controlled office environment.

•                Incumbentmay sit for long periods of time at desk or computer terminal.

•                Incumbentmay use calculators, keyboards, telephone, and other office equipment duringnormal workday.

Stooping, bending, twisting, and reaching may bereq

Akhand Pratap

IT Technical Recruiter

Email: akhand@tekinspirations.com

Phone: 315-745-3723 

W: www.tekinspirations.com

13573 Tabasco Cat Trail Frisco, TX 75035

Due to heavy call flow I may miss your call, so email is the best way to reach me
 
Disclaimer: If you are not interested in receiving our e-mails then please reply with a "REMOVE" in the subject line to remove@tekinspirations.com. And mention all the e-mail addresses to be removed with any e-mail addresses, which might be diverting the e-mails to you. We are sorry for the inconvenience.

Company Information